-
Notifications
You must be signed in to change notification settings - Fork 417
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Upload new file: 抓 Windows 密码,这 7 种技术够不够用!.md via simpread
- Loading branch information
Showing
1 changed file
with
30 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
> 本文由 [简悦 SimpRead](http://ksria.com/simpread/) 转码, 原文地址 [mp.weixin.qq.com](https://mp.weixin.qq.com/s/wAE84-n5rtfIvEKNIAEdPQ) | ||
内网渗透中,获取到 Windows 系统权限之后,抓取本地哈希是必不可少的操作,今天分享一款工具,集成了 7 种转储 LSASS 内存的方法,工具地址: | ||
|
||
> https://github.com/Offensive-Panda/ShadowDumper | ||
运行如图: | ||
|
||
![](https://mmbiz.qpic.cn/mmbiz_png/sGfPWsuKAfelrH4jneuT05mcu7xMk0pIO9mX06tw4ia6paOqhs2Hv9picpWBf42f211iaxdrfiayrJTFIZBKtzEqDg/640?wx_fmt=png&from=appmsg) | ||
|
||
未提供任何参数运行程序,会要求你输入所要指定的方法,参数为 1-7,功能分别对应: | ||
|
||
1. 使用解除挂钩技术转储 lsass 内存以注入修改后的 mimikatz 二进制文件。 | ||
|
||
2. 使用解除挂钩技术转储 lsass 内存以使用 MDWD 的直接系统调用注入二进制文件。 | ||
|
||
3. 使用简单的 MiniDumpWriteDump API 转储 lsass 内存。 | ||
|
||
4. 使用 MINIDUMP_CALLBACK_INFORMATION 回调转储 lsass 内存。 | ||
|
||
5. 使用进程分叉技术转储 lsass 内存。 | ||
|
||
6. 使用 MiniDumpWriteDump 的直接系统调用转储 lsass 内存。 | ||
|
||
7. 使用直接系统调用转储 lsass 内存(本机转储,带有离线解析所需的流)。 | ||
|
||
|
||
随机选一个,比如 5,结果如图: | ||
|
||
![](https://mmbiz.qpic.cn/mmbiz_png/sGfPWsuKAfelrH4jneuT05mcu7xMk0pI3kPEPMjf3L70oOdic6pTm4ylibo7piaLVzKg06mic3ibRk1xz1lmj8ticWoA/640?wx_fmt=png&from=appmsg) |